Abstract
Network security is a weak link in wired and wireless network systems which if breeched then the functionality of the underlying network is impaired by malicious attacks and causes tremendous loss to the network. The DoS (Denial of Service) attacks are one of the harmful network security threats. Ad Hoc networks can be easily damaged by such attacks as they are infrastructure less and without any centralized authority. This paper narrates results of an undertaken research work to study the consequence of selected DoS attacks on the performance of Ad Hoc networks. The gained knowledge is used to design and develop a security framework to detect intrusion and perform response actions. The validations of proposed defense system are carried out using statistical approach. All Simulations were carried out in NS-2.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Conti, M.: Body, personal and local ad hoc wireless networks. In: The Handbook of Ad Hoc Wireless Networks, Chap. 1. CRC Press LLC (2003)
Ilyas, M.: The Handbook of Ad Hoc Wireless Networks. CRC Press (2003)
Stallings, W.: Wireless Communication and Networks. Pearson Education (2002)
Schiller, J.: Mobile Communication. Addison-Wesley (2000)
Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co., Fort Washington (1980)
Wu et al.: A survey of attacks and countermeasures in mobile ad hoc networks. In: Wireless/mobile network security, vol. 17. Springer (2006)
Virada, V.P.: Intrusion detection system (IDS) for secure MANETs: a study. Int. J. Comput. Eng. Res. (ijceronline.com) 2(6). ISSN 2250-3005(online) October 2012
Zhang, X., Sekiya, Y., Wakahara, Y.: Proposal of a method to detect black hole attack in MANET. In: International Symposium on Autonomous Decentralized Systems (ISADS ‘09), pp. 1–6 (2009)
Al-Shurman, M., Yoo, S.-M., Park, S.: Black hole attack in mobile ad hoc networks. ACM Southeast Regional Conference (2004)
Aad, I., Hubaux, J.-P., Knightly, E.W.: Denial of service resilience in ad hoc networks. In: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, pp. 202–215 (2004)
Bellardo, J., Savage, S.: 802.11 Denial-of-service attacks: real vulnerabilities and practical solutions. In: Proceedings of the 12th Conference on USENIX Security Symposium, vol. 12
Mistry, N., Jinwala, D.C., Zaveri, M.: Improving AODV protocol against blackhole attacks. In: Proceedings of the International Multi Conference of Engineer and Computer Science, vol. 2 (2010)
Soomro, S.A., Soomro, S.A., Memon, A.G., Baqi, A.: Denial of service attacks in wireless ad hoc networks. J. Inform. Commun. Technol. 4(2), 1–10
Bhardwaj, M., Singh, G.P.: Types of hacking attack and their countermeasure. Int. J. Educ. Plann. Admin. 1(1), 43–53
Atiya Begum, S.: Techniques for resilience of denial of service attacks in mobile ad hoc networks. Int. J. Sci. Eng. Res. 3(3) (2012)
Zhang, Y., Lee, W., Huang, Y.: Intrusion detection techniques for mobile wireless networks. ACM/Kluwer Wireless Networks J. (ACM WINET) 9(5) (2003)
Aad, I., Hubaux, J.P., Knightly, E.W.: Denial of service resilience in ad hoc networks. ACM, MOBICOM, Philadelphia, PA, USA (2004)
Mukherjee, B., Heberlein, L., Levitt, K.: Network intrusion detection. IEEE Network 8(3), 26–41 (1994)
Chan, Y.K., et al.: IDR: an intrusion detection router for defending against distributed denial-of-service (DDoS) attacks. In: Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN’04), pp. 581–586 (2004)
Buttyán, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. ACM J. Mobile Networks (MONET) 8(5), 579–592 (2003)
Luo, H., Lu, S.: Ubiquitous and robust authentication services for ad hoc wireless networks. Department of Computer Science, UCLA, Technical Report TR-200030 (2000)
Sun, B., Wu, K., Pooch, U.W.: Alert aggregation in mobile ad hoc networks. In: Proceedings of the 2003 ACM Workshop on Wireless Security (WiSe’03) in Conjunction with the 9th Annual International Conference on Mobile Computing and Networking (MobiCom’03), pp. 69–78 (2003)
Raj, P.N., Swadas, P.B.: DPRAODV: a dynamic learning system against blackhole attack in AODV based MANET. Int. J. Comput. Sci. 2, 54–59 (2009)
Tseng, F.H., et al.: A survey of black hole attacks in wireless mobile ad hoc networks. Human-centric Comput. Inform. Sci. 1, 4 (2011). doi:10.1186/2192-1962-1-4
Alampalayam, S.P.: Classification and review of security schemes in mobile computing, wireless sensor networks. 2, 419–440 (2010)
Trost, B.W.: Authenticated ad hoc routing at the link layer for mobile systems. Wireless Networks 7(2), 139–145 (2001)
Brutch, P., Ko, C.: Challenges in intrusion detection for wireless ad hoc networks. In: Proceedings of Symposium on Applications and the Internet Workshop, pp. 368–373 (2003)
Tseng, C., Balasubramanyam, P.: A specification-based intrusion detection system for AODV, In: Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 125–134 (2003)
Kachirski, O., Guha, R.: Effective intrusion detection using multiple sensors in wireless ad hoc networks. In: Proceedings of 36th International Conference on System Sciences, pp. 57–64 (2003)
Lou, K.H., Xu, K., Gu, D., Gerla, M., Lu, S.: Adaptive security for multilayer ad hoc networks. Special Issue of Wireless Communication Mobile Comput. 2, 533–547 (2002)
Ye, N., Chen, Q.: An anomaly detection techniques based on a CHI-SQUARE statistics for detecting intrusion into information system. Quality Reliab. Eng. Int. (2001)
Ye, N., Li, X., Emran, M., Xu, M.: Probabilistic techniques for intrusion detection based on computer audit data. IEEE Trans. Syst. Man Cybern. (2001)
Alampalayam, S.P., et al.: Intruder identification and response framework for mobile ad hoc networks. In: Conference Proceedings, Conference: 22nd International Conference on Computers and Their Applications, CATA-2007, Honolulu, Hawaii, USA, March 28–30 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Lokhande, S., Bhalchandra, P., Khamitkar, S., Deshmukh, N., Mekewad, S., Wasnik, P. (2016). Statistically Validating Intrusion Detection Framework Against Selected DoS Attacks in Ad Hoc Networks: An NS-2 Simulation Study. In: Behera, H., Mohapatra, D. (eds) Computational Intelligence in Data Mining—Volume 1. Advances in Intelligent Systems and Computing, vol 410. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2734-2_41
Download citation
DOI: https://doi.org/10.1007/978-81-322-2734-2_41
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2732-8
Online ISBN: 978-81-322-2734-2
eBook Packages: EngineeringEngineering (R0)